Government Surveillance<br />Larry Jennings • Robert Schwien<br />Stacy Drake • Eric Crump<br />
Surveillance<br />Background<br />Intended vs. Unintended use of tech<br />Examples<br />Assumptions<br />Utilitarian Anal...
Technology We Use Everyday!<br />PC / Internet <br />Consumer Card Programs<br />Electronic Toll Collection (iPass)<br />D...
What do these have in common?<br />They All Collect Data!<br />
What is REALLY being collected?<br />PC / Internet <br />Data is stored at ISP and other servers<br />Consumer Card Progra...
Who gets this information?<br />Corporations<br />Government<br />
Who gets this information?<br />Corporations<br />	Great for Marketing Opportunities<br />Government<br />	Great for tryin...
A system that knows it all!<br />Total Information Awareness (TIA)<br />
Who gets this information?<br />Corporations<br />	Great for Marketing Opportunities<br />Government<br />	Great for tryin...
<ul><li>TEXT</li>
Upcoming SlideShare
Loading in …5
×

Ethics pres

347
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
347
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • But this leaves the question, Where does the data go??? Currently there are 2 organizations“Commercial” and “Government”We all know that companies store everything that they can find about you. But how about the government. What about the 1 organization that REALLY knows pretty much all of your sensitive data. So, what happens when all of this information is combined? . Lets look at a program that was canceled a few years back. However parts of this program are still in development in other countries.
  • Ethics pres

    1. 1. Government Surveillance<br />Larry Jennings • Robert Schwien<br />Stacy Drake • Eric Crump<br />
    2. 2. Surveillance<br />Background<br />Intended vs. Unintended use of tech<br />Examples<br />Assumptions<br />Utilitarian Analysis<br />Kantian Analysis<br />Conclusions<br />Questions<br />
    3. 3. Technology We Use Everyday!<br />PC / Internet <br />Consumer Card Programs<br />Electronic Toll Collection (iPass)<br />DVRs<br />GPS /E911/Onstar<br />Public Surveillance Cameras<br />
    4. 4. What do these have in common?<br />They All Collect Data!<br />
    5. 5. What is REALLY being collected?<br />PC / Internet <br />Data is stored at ISP and other servers<br />Consumer Card Programs<br />Transactions and Products are stored<br />Electronic Toll Collection (iPass)<br />Date and Time of going through are stored on Government Servers<br />DVRs<br />Often no restrictions on data storage and access from marketers and advertisers<br />GPS /E911/Onstar<br />Ability to track people and send data to servers..<br />Some GPS is latent and can be turned on remotely<br />Public Surveillance Cameras <br />These devices are now being programmed to recognize “suspicious behavior “and alert proper authorities<br />These include police and potentially government.<br />Not sure about facial recognition<br />
    6. 6. Who gets this information?<br />Corporations<br />Government<br />
    7. 7. Who gets this information?<br />Corporations<br /> Great for Marketing Opportunities<br />Government<br /> Great for trying to identify Terrorists!!!<br />BUT!<br />
    8. 8. A system that knows it all!<br />Total Information Awareness (TIA)<br />
    9. 9. Who gets this information?<br />Corporations<br /> Great for Marketing Opportunities<br />Government<br /> Great for trying to identify Terrorists!!!<br />BUT!<br />
    10. 10.
    11. 11. <ul><li>TEXT</li>

    ×